Trustmark Definition Name | Version |
---|---|
Defines conformance and assessment criteria for verifying that an organization maintains accountability for information system media during transport outside of controlled areas.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization documents activities associated with the transport of information system media.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization protects and controls organization-defined types of information system media during transport outside of controlled areas using organization-defined security safeguards.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization restricts the activities associated with the transport of information system media to authorized personnel.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system implements cryptographic mechanisms to protect the confidentiality and integrity of information stored on digital media during transport outside of controlled areas.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization employs an identified custodian during transport of information system media outside of controlled areas.
|
1.0 |
Defines conformance and assessment criteria for compliance with minimum security requirements for media use restrictions as related to overall media protection requirements.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization prohibits the use of sanitization-resistant media in organizational information systems.
|
1.0 |
Defines conformance and assessment criteria for verifying that an organization prohibits the use of portable storage devices in organizational information systems when such devices have no identifiable owner.
|
1.0 |
Defines conformance and assessment criteria for verifying that an information system implements organization-defined security safeguards to protect its memory from unauthorized code execution.
|
1.0 |
Addresses the requirement for the methods used to publicize PKI certificate revocation to be described in the organization's approved Certificate Practices Statement (CPS)
|
1.0 |
Addresses the requirement for an organization's methods to publicize PKI certificate revocation to meet or exceed the requirements for CRL issuance stated in the corresponding certificate policy.
|
1.0 |
Addresses the requirement for an organization's methods to publicize PKI certificate revocation to meet or exceed the requirements for CRL latency stated in the corresponding certificate policy.
|
1.0 |
Addresses the requirement for an organization's methods for publicizing revoked PKI certificates to provide authentication services commensurate with the assurance level of the certificates being verified.
|
1.0 |
Addresses the requirement for an organization's methods for publicizing revoked PKI certificates to provide integrity services commensurate with the assurance level of the certificates being verified.
|
1.0 |
Defines privacy requirements for the collection of sensitive information to be limited to information that is relevant to the purposes of collection.
|
1.0 |
Defines privacy requirements related to mechanisms used to destroy sensitive information.
|
1.0 |
Defines privacy requirements related to limitations on disclosure of sensitive information.
|
1.0 |
Defines privacy requirements related to the documentation of requested user information.
|
1.0 |
Defines privacy requirements for organizations to collect sensitive information by fair means.
|
1.0 |
Defines privacy requirements for organizations to transmit only those attributes required by the federal profile.
|
1.0 |
Defines privacy requirements for organizations to collect sensitive information by lawful means.
|
1.0 |
Defines privacy requirements related to limits on the collection of individuals' sensitive information.
|
1.0 |
Defines privacy requirements evaluate new activities and technologies that might impact personal privacy.
|
1.0 |
Defines privacy requirements related to mechanisms used to reduce the retention of sensitive information.
|
1.0 |